PixelYourSite - Insecure deserialization
Summary
Name | PixelYourSite- Your smart PIXEL (TAG) and API Manager 10.1.1.1 - Insecure deserialization |
Code name | skims-23 |
Product | PixelYourSite- Your smart PIXEL (TAG) and API Manager |
Affected versions | Version 10.1.1.1 |
State | Public |
Release date | 2025-02-28 |
Vulnerability
Kind | Insecure deserialization |
Rule | Insecure deserialization |
Remote | No |
CVSSv4 Vector | CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U |
Exploit available | No |
CVE ID(s) | CVE-2025-0769 |
Description
PixelYourSite- Your smart PIXEL (TAG) and API Manager 10.1.1.1 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/modules/facebook/facebook-server-a sync-task.php.
Vulnerability
Skims by Fluid Attacks discovered a Insecure deserialization in PixelYourSite- Your smart PIXEL (TAG) and API Manager 10.1.1.1. The following is the output of the tool:
Skims output
24 |
25 | } catch (xception $ex) {
26 | error_log($ex);
27 | }
28 |
29 | return array();
30 | }
31 |
32 | protected function run_action() {
33 | try {
> 34 | $data = unserialize(base64_decode($_POST['data']));
35 |
36 | $events = is_array($data[0]) ? $data[0] : $data ;
37 | if (empty($events)) {
38 | return;
39 | }
40 |
41 | foreach ($events as $event) {
42 | FacebookServer()->sendEvent($event[""pixelIds""],$event[""event""]);
43 | }
44 |
^ Col 0
Our security policy
We have reserved the ID CVE-2025-0769 to refer to this issue from now on.
System Information
- Version: PixelYourSite- Your smart PIXEL (TAG) and API Manager 10.1.1.1
Mitigation
The vendor released the following versions with the patch: PixelYourSite Free: 10.1.1.2 and PixelYourSite Pro: 11.2.2.3
Credits
The vulnerability was discovered by Andres Roldan from Fluid Attacks' Offensive Team using Skims
Timeline

2025-01-03
Vulnerability discovered.

2025-02-27
Vendor contacted.

2025-02-27
Vendor replied acknowledging the report.

2025-02-27
Vendor Confirmed the vulnerability.

2025-02-28
Vulnerability patched.

2025-02-28
Public Disclosure.